Site icon Exam4Training

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

Which of the following protocols uses public-key cryptography to authenticate the remote computer?
A . SSH
B . Telnet
C . SCP
D . SSL

Answer: A

Exit mobile version